Questions tagged [tamper-resistance]
The tamper-resistance tag has no summary.
35 questions
4
votes
4
answers
631
views
What advantage do hardware tamper-resistance provide in HSM?
Roughly speaking HSM is supposed to ingest or generate some secret material (key) and then never export them through the command interface. The keys can only be used according to their configured ...
1
vote
1
answer
195
views
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?
Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop ...
0
votes
2
answers
643
views
Is encrypting a query parameter within a URI a security best practice?
Assumption a customer is sitting in a public area connected to a public wifi. A threat actor can access the customer's browser and read all Javascript variables.
Step 1. example.com server sends the ...
0
votes
0
answers
261
views
How smart cards store their secrets? [duplicate]
How smart cards technically store their secrets?
I know smart card is whole computer on chip and it respond only to challenges. I know their software/firmware doesn't allow (it doesn't have the ...
0
votes
1
answer
799
views
Preventing Windows from seeing/tampering with linux drive
Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive?
I understand I can encrypt the linux drive, but wouldn't the windows system be still able to ...
1
vote
2
answers
1k
views
Tactics to ensure payload has not been modified
When sending a request (POST, PUT, etc). I have a security requirement to ensure that the data in the payload has not been tampered with.
In other words I need to know with certainty that the data ...
0
votes
1
answer
191
views
Preventing printed data interception using origami or other technique?
Suppose I want to print a human readable 10 digit serial using ordinary day today printer but the printer is communal printer and manned. My intention is for the person manning the printer to not read ...
2
votes
1
answer
943
views
Tamper Protected VS. Tamper Proof for write-protected memories
I read in the answer here by Marcus that ROM is Tamper-proof.
What is the difference between tamper-proof, tamper protected and tamper-resistant?
Now, there are some re-writable memory (eg. eNVM) ...
1
vote
1
answer
503
views
How to know whether a textfile has been edited or tampered with on the local system?
Related to "How to know whether a textfile has been edited or tampered with?", I wonder if it's possible to detect file tampering on the local system?
Typical threat model: the old "Hack" computer ...
2
votes
1
answer
3k
views
Is the security seal on samsung phones proof that the phone has not been tampered with?
Samsung phones come with a security seal that says you should not buy the phone if it is broken. Is this proof that no one has tampered with the phone?
Is there some way to take off the seal and ...
1
vote
3
answers
796
views
Tamper proof SD card
Hackers can hack the SD memory card micro controller and physical tampering to modify the SD card firmware or hardware.
https://media.ccc.de/v/30C3_-5294-en-_saal_1_-201312291400-...
3
votes
5
answers
3k
views
Prove log files weren't tampered with?
Say I have some Apache logs that show brute force attempts on a login page. I've singled out the IP, and found out who the culprit was. How can I show to a third party that I didn't makeup the entries ...
14
votes
2
answers
2k
views
Securing a Laptop from a Foreign Intelligence Agency
What would be the best practices for securing a single-purpose Windows laptop against a determined foreign intelligence agency from tampering with data on the machine? The machine would be used ...
5
votes
1
answer
1k
views
What use does a TPM have for accurate timekeeping?
I stumbled across this image and something immediately stood out to me. This is a photograph of a discrete TPM card. That silver cylinder on the left is a crystal oscillator, used to tell time with ...
3
votes
2
answers
7k
views
How do you keep someone from changing hidden values in an HTML form?
If I have an HTML form, and it has hidden inputs for ID numbers and the like (so I know the id key of of table x to update), how can I secure it so the person can't just change it and screw up ...